3271 Episodes

  1. Twofold snooping venture.

    Published: 5/30/2020
  2. Sandworm is out and about, so patch already. Steganography used in attacks on industrial targets. An Executive Order on Preventing Online Censorship. Breaches, ransomware, and lessons.

    Published: 5/29/2020
  3. Hackers for hire. A bulk power distribution risk? An Executive Order on social media is under consideration. COVID-19 and cybersecurity.

    Published: 5/28/2020
  4. Berserk Bear is back, and still loves that critical infrastructure honey. COVID-19 apps: good, bad, and bogus. Android issues discovered. A FIN7 arrest. Mr. Faraday’s underwear.

    Published: 5/27/2020
  5. The evolution of malware, both criminal and state-run.

    Published: 5/26/2020
  6. Naming and shaming is the worst thing we can do.

    Published: 5/23/2020
  7. An election database leaks. Phishing from Firebase. Shiny Hunters sell Mathway user records. COVID-19-themed scams. On that return to the office thing...

    Published: 5/22/2020
  8. Cyberwar, cybercrime, and hacktivism: updates on all three. Contact tracing and its discontents. Cybersecurity economic trends during the pandemic.

    Published: 5/21/2020
  9. Cyber espionage: many operations and many targets. Misinformation and online fraud during the pandemic. Beer and conviviality versus operational security.

    Published: 5/20/2020
  10. Cyber conflict in the Middle East. EasyJet breached. More errors than exploits. The Dark Web during the pandemic. 5G misinformation. REvil updates.

    Published: 5/19/2020
  11. Supercomputers as cryptomining rigs. UK grid operator recovers from hack. EU Parliament data exposure. REvil ransomware gang promises dirty laundry. US-China conflict. Catphishing.

    Published: 5/18/2020
  12. Gangnam Industrial Style APT campaign targets South Korea.

    Published: 5/16/2020
  13. Malware versus air-gapped systems. Ransomware against utilities and hospitals. Lessons for cybersecurity from the pandemic response. Outlaw blues.

    Published: 5/15/2020
  14. ARCHER incident. Contact tracing smishing. Malware vs. air gaps. A surcharge for deletion. Anti-creepware. 5G coronavirus delusions.

    Published: 5/14/2020
  15. More data theft by ransomware. Patch Tuesday notes. Espionage and possible data corruption against COVID-19 researchers. Be a role model for your AI.

    Published: 5/13/2020
  16. Cyberwar looms in the Middle East? Hidden Cobra’s fangs described. Evasive Astaroth. Ransomware in Texas courts. COVID-19 espionage. Content moderation.

    Published: 5/12/2020
  17. Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media.

    Published: 5/11/2020
  18. Cybersecurity First Principles

    Published: 5/11/2020
  19. The U.S. campaign trail is actually quite secure.

    Published: 5/9/2020
  20. PLA cyber espionage, and training WeChat censorship algorithms against the Chinese diaspora. Snake is back, and so is Charming Kitten. Election security. Recruiting money mules.

    Published: 5/8/2020

99 / 164

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.